True to its Marxist-Leninist roots, the Chinese Communist Party has long regarded religion as spiritual opium. A few weeks ago, it appeared to double down on the drugs imagery by banning people from entering the country carrying religious ideas or objects beyond those required for personal use. Foreign nationals hoping to deal in religion — preaching, teaching or organising religious events — must now seek permission ahead of time from state-sanctioned religious bodies (that permission wi...| UnHerd
As Americans are finding out more about the widespread use of automatic license plate reading cameras (ALPRs), the massive […]| AnneLandmanBlog
Alberta's Ministry of Mental Health and Addiction is quietly terminating its contract with a personal data-harvesting app and replacing it with a publicly-owned 'bed availability dashboard.' The move coincides with reported scrutiny of ministry spending by the Auditor General.| Drug Data Decoded
Amnesty International has warned that the world’s biggest technology companies now hold so much influence that basic rights are at risk. The report names Alphabet, Meta, Microsoft, Amazon, and Apple, and describes how their grip extends over search, social media, advertising, cloud systems, e-commerce, and mobile platforms. In many countries, using the internet almost always means passing through their services. | Digital Information World
Anthropic is introducing new rules for those using its Claude chatbot. By the end of September, individuals will need to choose whether their conversations can be used for training the company’s future models. This marks a departure from its earlier practice, where consumer data was kept only for short periods and never included in model development.| Digital Information World
Mobile apps are notoriously “data-hungry,” with developers collecting personal and even sensitive data from their users and their users’ devices and using that information for both legitimate and illegitimate purposes.| Digital Information World
MiCAR is driving a step change in investor protection across digital asset markets.| Markets Media
Leaked emails show Epstein’s attempts to dabble in security tech—across borders—in the last years of his life.| Reason.com
La lutte contre la vidéosurveillance algorithmique (VSA) est une bataille de longue haleine. L’expérimentation officielle, menée au prétexte des Jeux Olympiques, s’est pourtant achevée fin mars et a été émaillée de multiples défaillances. En parallèle,…| La Quadrature du Net
Au milieu de l’hiver, la loi Narcotrafic est arrivée à toute vitesse et, avec elle, ont déferlé des propositions sécuritaires et de surveillance qui dépassaient largement la question du trafic de stupéfiants. Avec vous, nous…| La Quadrature du Net
An August 12 article in the local publication The Revolutionist by Jacob Richards titled “GJPD Cameras Accessed Five Times During […]| AnneLandmanBlog
The Pegasus hacking tool was just the beginning. A new survey of spyware firms reveals Israeli companies are being used by agencies in Western nations to build perfect dictatorships under democratic guise. This article was originally published by ¡Do Not Panic! Last week another batch of peaceful pro-Palestine protestors were arrested by British police on suspicion| The Grayzone - News and investigative journalism on empire
Skechers is making a line of kid’s shoes with a hidden compartment for an AirTag.| Schneier on Security
Mick Hall covers the upgrade of the U.S. intelligence agency's Wellington operation to "counter the CCP" as another milestone of U.S. meddling in the Asia-Pacific. By Mick Hall in Whangarei, New Zealand Special to Consortium News The opening of a Federal Bureau of Investigations standal| Consortium News
The EU is edging towards its biggest peacetime surveillance experiment yet — scanning every private message before it's even sent.| The Daily Sceptic
‘Defending the institutions and “standing up for science” is really clinging to a bygone illusion. The stakes of institutional engagement are changing as institutions are…being de…| Legal Form
A Freedom of Information Act lawsuit by Defending Rights and Dissent uncovers evidence that FBI agents spied on a panel at the 2018 Left Forum| The Dissenter
A state that monitors its citizens without restraint is no longer protecting its people.| Indonesia at Melbourne
Now that I’ve mentioned it to her, Ms. Pacidal—an Amis Indigenous woman in her 80s—starts to fiddle with the watch on her left hand. It has a black, square, and boxy plastic face, on which shines a dimly lit screen that shows the date and time, location tracking services, and a daily step count. “It’s light,” she says. “In fact, almost forgettable!” It’s secured on Ms. Pacidal’s arm with a rubber strap, and she tells me that she has not taken it off for months.| Platypus
On Friday, the Cyberlaw Clinic filed an amicus brief before the Massachusetts Supreme Judicial Court in the case Commonwealth v. Thanh Du. The brief, filed on behalf of the Massachusetts […]| Cyberlaw Clinic
A network of hundreds of cameras, accessible to police at any time for any reason, is concentrated in the city's poorest areas.| The Shoestring
So many ironies, so little time. According to the Financial Times (and syndicated at Ars Technica), the US government, which itself has traditionally demanded law enforcement access to encrypted messages and data, is pushing the UK to drop its demand that Apple weaken its encryption. Normally, you want to say, Look here, countries are entitled … Continue reading "Magic math balls" The post Magic math balls appeared first on net.wars.| net.wars
Every local authority using (or having the ability to use) covert surveillance, under the Regulation of Investigatory Powers Act 2000 (RIPA), should expect regular inspections by the Investigatory Powers Commissioner’s Office (IPCO). Typically, these are conducted every three years, though frequency may vary based on activity levels and past findings. These inspections are a key … Continue reading "When the RIPA Inspector Calls "| Your Front Page For Information Governance News
La numérisation à marche forcée des services publics ne découle pas de la prétendue « révolution numérique ». La dématérialisation des démarches administratives, les algorithmes de contrôle CAF, le profilage des chômeurs et des chômeuses, les logiciels de gestion et d’aide à la décision qui régissent les tâches des travailleurs et des travailleuses sociales sont la concrétisation de choix politiques et d’orientations du service public. S’inscrivant dans une logiqu...| Le Mouton Numérique
“This is how cyberlibertarianism works: it is not so much about party politics as it is about controlling the terms of discourse and the conversation itself. This ensures that only … Continue reading →| LibrarianShipwreck
Flock's automatic license plate reader (ALPR) cameras are in more than 5,000 communities around the U.S. Local police are doing lookups in the nationwide system for ICE.| 404 Media
Executive Q & A with Jay Jason Bartlett, CEO, Cozaint Q1: Welcome Jay to this Fujifilm Insights Executive Q & A! Please tell us a bit about your role and responsibility as CEO of Cozaint. Ans: Thanks Rich for the invite. I head up a great team of engineers and professionals that have a ton […] The post Why LTO Data Tape is a Perfect Fit for the Massive Video Surveillance Market appeared first on Fujifilm Data Storage.| Fujifilm Data Storage
By Rich Gadomski, Head of Tape Evangelism, FUJIFILM Data Storage Solutions The International Security Conference held its annual west coast trade show in Las Vegas on April 10 -12. ISC West is the premier showcase for the latest innovations and solutions spanning a broad range of security technologies for security professionals, system integrators, manufacturers and […] The post ISC West 24 Reveals Pain Points of Video Surveillance Retention and How LTO Data Tape with Cozaint’s Marcia is ...| Fujifilm Data Storage
Spies have been around forever, but, in this weeks’ Time Machine, we’re looking at the modern surveillance state…and what Americans have thought about it over the decades. The formation of the NSA in 1952 marked the beginning of modern-day government surveillance and public opinion on privacy and security has slowly evolved ever since. Among the […]| Home of the Marist Poll
The U.K. has spent decades trying to subvert Iran’s government, but also secretly sold them chemical weapons and spied on opposition activists, reports Martin Williams. By Martin Williams Declassified UK As bombs fell on Iran last month, the U.K. government claimed it had “not partici| Consortium News
China’s cyber and info war is already here — and the U.S. is playing catch-up.| The Globalist
Anonymous Submission to Jersey Counter-Info Philly’s not the only city with too many cameras so let’s make Camover 2025 go as far and wide as the surveillance state. Text and…| Jersey Counter-Info
The June 22, 2025 broadcast covers the following stories: TRANSCRIPT JUSTIN BRAKE: From Benoit's Cove, Newfoundland and Labrador, this is The Indy Broadcast. Welcome to the show for Sunday, June […]| The Independent
A sheriff's office in Texas searched a giant nationwide database of license plate numbers captured by automatic cameras to look for a woman they suspected of se| net.wars
"Workplace technology shouldn't be about control. When implemented transparently, it can enhance the employee experience."| Machine
Atlanta is the most surveilled city in the United States. With 124.14 surveillance cameras per 1,000 people, we not only lead the country, we have more than twice as many cameras per capita as 2nd …| mapping atlanta
Many people who focus on information security, including myself, have long considered Telegram suspicious and untrustworthy. Now, based on findings published by the investigative journalism outlet ISt| Songs on the Security of Networks
Additional funding and new rules for Portland Police Bureau’s drone program -- rules written by the police bureau -- could be coming very soon.|
A series questioning the AI race concept and how it drives US AI and China policy|
I just returned from an international trip. I’m going to integrate these into the original post here, but for now I’ll just relate my recent experience and key takeaways. Background I’ve been rather paranoid about traveling abroad, despite having done it many times before. More specifically, I was worried about returning to the United States […] The post Border Insecurity (Update) appeared first on Firewalls Don't Stop Dragons.| Firewalls Don't Stop Dragons
It's time for another quick and easy 'dragon hack'. Today I'll tell you how to stop people from snooping on your communications. Meet Your Foe: Spying Message Apps Since the dawn of the World Wide Web, we've had proprietary messaging apps: AOL Instant Messenger (AIM), Yahoo Messenger and MSN Messenger were probably the most popular.| Firewalls Don't Stop Dragons
France Travail déploie actuellement des robots visant à automatiser et massifier le contrôle des personnes inscrites à France Travail. Depuis le 1 janvier 2025, cela inclut également les personnes au RSA. Il s'agit d'une nouvelle étape du dangereux projet de gestion algorithmique des personnes sans-| La Quadrature du Net
As West Nile virus is detected in mosquitoes collected in the UK for the first time, we take a look at how UKHSA is protecting the UK from vector-borne diseases| ukhsa.blog.gov.uk
In NZ, we like our fascism casual.| Aotearoa Workers Solidarity Movement
Today's links| Pluralistic: Daily links from Cory Doctorow
UpGuard’s security researcher Chris Vickery has discovered three misconfigured AWS S3 buckets that are available for public access on the internet. The| Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
As Chief Mark Neufeld announces his resignation, a ten-month investigation by Drug Data Decoded reveals extensive social media monitoring by his media relations unit that could violate privacy regulations.| Drug Data Decoded
Your rights are significantly reduced when crossing the border, even if you're entering your own country. Sadly, there's not a lot you can do about it.| Firewalls Don't Stop Dragons
Clearview AI’s saga in Europe underscores the clash between international tech firms and supposedly robust EU privacy laws.| Solomon
This week, the Cyberlaw Clinic filed an amicus brief before the Supreme Judicial Court of Massachusetts (“SJC”) in Commonwealth v. Rodriguez (SJC-13727). The Clinic represented the Innocence Project, the Center on Privacy & Technology at Georgetown Law, and independent researcher Dr. Isadora Borges Monroy. The brief supports defendant-appellee Nathaniel Rodriguez, who objects to the Lowell Police Department’s use of racially-targeted police investigatory techniques on social media platf...| Cyberlaw Clinic
A discussion with WBAI’s Law and Disorder radio show on the new graphic booklet Homeland Security: Myths and Monsters. The post Audio: Interview with Law and Disorder radio show appeared first on Arun Kundnani.| Arun Kundnani
Host James Pope and Arun Kundnani go deep on the life of Jamil Al-Amin, formerly known as H. Rap Brown, in this conversation for the Africa World Now radio show.| Arun Kundnani
The privately owned, sole-sourced app that collects personal health information of people entering recovery programs was launched as ‘voluntary’ to comply with Alberta privacy laws. But eight months later, it isn’t voluntary anymore.| Drug Data Decoded
The transatlantic dimension of intelligence sharing and intelligence diplomacy is being eroded since Trump's re-election and his pledging allegiance to the red, white, and blue of Putin’s Russia.| about:intel
Julian Rose Polish Premier Donald Tusk is going all out to make Poland the leading European country in the development of AI technologies, especially ‘Cloud’ advanced ‘internet of everything’ computing and digital two way distribution systems. Cozying up to the US corporation Microsoft has won Tusk a seven hundred million dollar investment package “To establish| Julian Rose
The Alberta government has yet to release its proposed Compassionate Intervention Act but indicated in 2023 that the Act would extend existing legislation for forced abstinence of children to adults. Documents show that survival and other data are not tracked after children exit the system.| Drug Data Decoded
In a Q&A for the Digital Front Lines report by Foreign Policy Analytics, The Citizen Lab director Ron Deibert and human rights activist Carine Kanimba| The Citizen Lab
Following a public workshop in July 2024, a report from the National Academies of Sciences, Engineering, and Medicine shares strategies for improving cancer surveillance. One of the OneFlorida+ Clinical Research Network’s executive chairs, Elizabeth Shenkman, Ph.D., spoke at the workshop about “Data Linkages in Cancer Surveillance Models.” Shenkman’s insights are summarized in a new report,…| OneFlorida+ Clinical Research Network
Surveillance didn’t disappear after the Cold War—it evolved. Instead of trench coats and wiretaps, today’s watchers come in the form of data brokers, predictive algorithms, and AI-powered behavioral tracking. The new spies don’t need to tail you through the streets; they already know where you are, where you’ve been, and where you’re going next. And […]| Krypt3ia
Introduction: Surveillance isn’t what it used to be. The days of trench coats and dead drops have given way to a world where the watchers don’t need to be human, and the tails don’t need to have legs. The Cold War spooks who wrote the original Moscow Rules played a game of human tradecraft; today, […]| Krypt3ia
Configuring Motion Notifications in Blue Iris with the Docker Container Ntfy. Overall, the best, and most performant setup you can use!| WunderTech
Follow us on Twitter @HackRead| Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
When the general public becomes increasingly aware of online surveillance attempts, how do they respond? Jon Penney, research fellow at Citizen Lab, looks into how individuals navigate this digital landscape and who is most likely to alter their behaviour.| The Citizen Lab
With EU funding, more and more countries are using artificial intelligence (AI) systems, drones, and surveillance towers at their borders, and gaining access to the personal data of people seeking refuge in Europe.| Solomon
The current big news on ChatGPT is around the decisions by K-12 school districts to pause, think, push back and sometimes “ban” ChatGPT. I’ve mostly…| Is a Liminal Space
Mayor London Breed’s priorities are all over your March 5 primary ballot, including one measure that proposes to give San Francisco police expanded use of drones and surveillance cameras.| SFist - San Francisco News, Restaurants, Events, & Sports
The Youth Endowment Fund (YEF) was established in March 2019 by children’s charity Impetus, with a £200m endowment and a ten-year mandate from the Home Office. The YEF has just published a report a…| Jen Persson's blog
WeChat communications conducted entirely among non-China-registered accounts are subject to pervasive content surveillance that was previously thought to be exclusively reserved for China-registered accounts.| The Citizen Lab
We're not just tracked as we surf the web, we're being tracked in the physical world, too. Our location can be very revealing. Here are some tips to limit this.| Firewalls Don't Stop Dragons
Vision language models represent a new generation of deep learning frameworks capable of processing both images and text as input and producing either as outputs. Though still relatively new, businesses are beginning to recognize the potential of these models and are gradually integrating them into applications. Vision language models can be used to query images, […] The post A Comparative Evaluation of Open-Source Vision Language Models appeared first on QBurst Blog.| QBurst Blog
With illustrations by Anuj Shrestha and co-authored with Mizue Aizeki. This is the century of homeland security. The federal government created a monster. They said it would keep us safe. The monster hatched in November 2002. It was named the Department of Homeland Security (DHS). An appetite for control and conquest was in its DNA.… The post Homeland Security: Myths and Monsters appeared first on Arun Kundnani.| Arun Kundnani
AI video analytics are a cost-effective solution enabling real-time accurate event detection for small businesses and smart retail.| Hailo
Today, the Supreme Judicial Court of Massachusetts (“SJC”) issued a ruling in Commonwealth v. Dilworth (SJC-13547), holding that the Boston Police Department violated the law by refusing to turn over evidence of potential online racial profiling. The decision is welcomed by the Cyberlaw Clinic, which previously represented Berkman Klein affiliates Michael Bennett and Zahra Stardust, along with the ACLU of Massachusetts and the Innocence Project, on an amicus brief in the case.| Cyberlaw Clinic
The state will spend millions on a controversial software as part of Governor Abbott’s border crackdown, as well as to “disrupt potential domestic terrorism.”| Truthdig
COVID Q & A Scientifically-informed, data-driven answers to your burning questions about the coronavirus pandemic Post #4: The Exit Strategy Welcome to Naturally Speaking’s blog series on COVID-19. This fourth episode is about the ‘exit strategy’: the lifting of lockdown measures related to the COVID-19 virus. This is a particularly challenging topic, as there are […]| Naturally Speaking
Welcome to Naturally Speaking’s blog series on COVID-19. This fourth episode is about the ‘exit strategy’: the lifting of lockdown measures related to the COVID-19 virus. This is a particular…| Naturally Speaking
Great service and customer support builds business and corporate culture, writes Alan Forman, President, Altronix Corp.| International Security Journal
In-depth report says tech from Hikvision, Dahua, Tiandy and Uniview enables China’s gross human rights abuses of Uyghur minority.| The Logic
Hanwha Vision and Immix enhanced its partnership with deeper integration to support AI analytics in video surveillance for Alarm Receiving Centres.| International Security Journal
Security Industry Regulation Agency (SIRA) provides recommendations on how to effectively maintain CCTV systems in extreme heat conditions.| International Security Journal
Explore how AI in public safety balances security & privacy. Our edge AI solutions ensure secure environments while respecting privacy. Learn how!| Hailo
They were good calls at the time. Just a few weeks ago a clutch of farm writers from across Canada converged on Glacier FarmMedia's Ag in Motion show west| Grainews
DPS plans to spend millions in taxpayer dollars on a controversial software, used first as part of Governor Abbott’s border crackdown, to “disrupt potential domestic terrorism.”| The Texas Observer
An app that privatizes health information of recovery patients is aimed at Alberta shelters, correctional facilities and supervised consumption sites. In one case, data from the app that showed a negative outcome was suppressed, but the government still publicly reported it.| Drug Data Decoded
My Recovery Plan was implemented to evaluate and manage substance use treatment waitlists across Alberta. Documents reveal how it denies patients informed consent and control of their personal health information.| Drug Data Decoded
Comme chaque lundi, un coup d’œil dans le rétroviseur pour découvrir les informations que vous avez peut-être ratées la semaine dernière. Tous les liens listés ci-dessous sont a priori accessibles librement. Si ce n’est pas le cas, pensez à activer votre bloqueur de javascript favori ou à passer en “mode lecture” (Firefox) ;-) Brave New...| Framablog
Follow us on Twitter @HackRead| Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
Comme chaque lundi, un coup d’œil dans le rétroviseur pour découvrir les informations que vous avez peut-être ratées la semaine dernière. Tous les liens listés ci-dessous sont a priori accessibles librement. Si ce n’est pas le cas, pensez à activer votre bloqueur de javascript favori ou à passer en “mode lecture” (Firefox) ;-) Brave New...| Framablog
Comme chaque lundi, un coup d’œil dans le rétroviseur pour découvrir les informations que vous avez peut-être ratées la semaine dernière. Tous les liens listés ci-dessous sont a priori accessibles librement. Si ce n’est pas le cas, pensez à activer votre bloqueur de javascript favori ou à passer en “mode lecture” (Firefox) ;-) Brave New...| Framablog
A trois jours de la fin des Jeux olympiques, la répression des militant.es se poursuit. Alors que, déjà la semaine dernière, trois militant.es ont été abusivement interpellé.es en marge d’un Toxic tour qui, par ailleurs, a pu se dérouler sans … Continue reading →| Non au Saccage 2024 !
When asked about privacy in the digital space, the usual answer seems to be a scoff. Sometimes it is even followed by a taunting sneer with a tint of “there is nothing we can do about it though” look. But why is that? A View on Privacy – The Scoff Here are the common […]| Open Ethics Initiative
As German intelligence law undergoes additional reforms, lawmakers should also fix the untenable gaps regarding the legal basis and oversight of surveillance activities by the German armed forces| about:intel
Comme chaque lundi, un coup d’œil dans le rétroviseur pour découvrir les informations que vous avez peut-être ratées la semaine dernière. Tous les liens listés ci-dessous sont a priori accessibles librement. Si ce n’est pas le cas, pensez à activer votre bloqueur de javascript favori ou à passer en “mode lecture” (Firefox) ;-) Brave New...| Framablog
Police at the University of Colorado Boulder have begun publishing statistics that reveal how they're using license plate readers installed around campus.| EdScoop
Contexts is a quarterly magazine that makes cutting-edge social research accessible to general readers.| Contexts
How optimizing the digital capabilities of the Dutch intelligence and security services has derailed. The post Stalemates in Dutch intelligence oversight appeared first on about:intel.| about:intel
Amidst opposition despair, Putin engineers his re-election| Coda Story
Remember that thumbsucker I did on the Great Firewall? Well, here’s some data, via this post (thanks, Jamie). It seems that Fang Binxing, China’s Chief Bellhead, boss of the Beijing University of Post & Telecoms, and king of the great firewall, really is in trouble due to his special relationship with Bo Xilai. He briefly […]| Alternate Seat of TYR
Tim Maughan takes a bus into the Cloud. Spread over two days in April at Princeton’s School of Architecture, Data Drama was the latest attempt to try and capture the post-Snowden, paranoia-infested, panic-overloaded, drone-struck global Zeitgeist - if such a thing even exists. Which academic disciplines are most applicable for trying to fathom where our collective networked neurosis is leading us? Data Drama’s curator Liam Young, known for his work at Princeton and London’s Architecture...| Arcfinity
From Alphaville to Robocop, science fiction has the measure of smart cities, says Tim Maughan. In a recent article on the continuing civil unrest in Turkey, sociologist Zeynep Tufekci argues that the science fiction metaphors the media so frequently turn to are outdated. “Nineteen Eighty-Four had finally arrived, it was said - just off by 30 years or so. But this is the wrong way to understand what’s happening,” she argues. “Deep and pervasive surveillance is real. It is likely worse ...| Arcfinity